Monthly Archives: May 2014

Troy Hunt: The mechanics of the iCloud “hack” and how iOS devices are being held to ransom Really good write up of the iCloud ransom attacks. That being said I think there is a lot more to be said here … Continue reading

Link | Posted on by | Tagged , , , , , | Leave a comment

Apps for Pentestets using Android

So of the applications on here could be very useful for physical pentration and technology based pentration testing. For example against facilities that dont have public access to the internet but still use local networks or even just use wireless … Continue reading

Posted in Uncategorized | Leave a comment

Twitter / robi_sen: Short history of Boko Haram …

Link | Posted on by | Tagged , , | Leave a comment

Twitter / robi_sen: Interesting malicious iOS plugin … Interesting malicious iOS plugin

Link | Posted on by | Tagged , | Leave a comment

Build Your Own Robi! Seriously who would not want their own Robi!

Link | Posted on by | Tagged , | Leave a comment

Interesting net neutrality opinion

O’Rielly wrote. “This pattern will likely recur as online streaming becomes even more popular. What happens under a net neutrality regime if Netflix, YouTube, or Hulu flex their muscles in the marketplace? Should the FCC similarly scrutinize their business decisions? … Continue reading

Posted in Uncategorized | Leave a comment

Kronecker Graphs: An Approach to Modeling Networks

Interesting paper  How can we model networks with a mathematically tractable model that allows for rigorous analysis of network properties? Networks exhibit a long list of surprising properties: heavy tails for the degree distribution; small diameters; and densification and shrinking … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment